Package: tor Version: 0.4.9.8-dev-20260517T181349Z-1~d14.forky+1 Architecture: amd64 Maintainer: Peter Palfrader Installed-Size: 5868 Depends: libc6 (>= 2.38), libcap2 (>= 1:2.10), libevent-2.1-7t64 (>= 2.1.8-stable), liblzma5 (>= 5.1.1alpha+20120614), libseccomp2 (>= 0.0.0~20120605), libssl3t64 (>= 3.0.0), libsystemd0, libzstd1 (>= 1.5.5), zlib1g (>= 1:1.1.4), adduser, runit-helper (>= 2.14.0~), lsb-base Recommends: logrotate, tor-geoipdb, torsocks Suggests: mixmaster, torbrowser-launcher, socat, apparmor-utils, nyx, obfs4proxy Conflicts: libssl0.9.8 (<< 0.9.8g-9) Breaks: runit (<< 2.1.2-51~) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor_0.4.9.8-dev-20260517T181349Z-1~d14.forky+1_amd64.deb Size: 2086092 SHA256: 137a50a9ce6454d34fe93689de9d8d8a0a2cdea994e516cb1743fdba9d63e584 SHA1: da149af730c89d47ab7c81baf156e10226e64549 MD5sum: 97184c35df0de635e78b2d2bdd4b12a5 Description: anonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs. Package: tor-dbgsym Source: tor Version: 0.4.9.8-dev-20260517T181349Z-1~d14.forky+1 Auto-Built-Package: debug-symbols Architecture: amd64 Maintainer: Peter Palfrader Installed-Size: 7438 Depends: tor (= 0.4.9.8-dev-20260517T181349Z-1~d14.forky+1) Breaks: tor-dbg (<< 0.3.1.5-alpha) Replaces: tor-dbg (<< 0.3.1.5-alpha) Priority: optional Section: debug Filename: pool/main/t/tor/tor-dbgsym_0.4.9.8-dev-20260517T181349Z-1~d14.forky+1_amd64.deb Size: 5834108 SHA256: 0d65066083a4c52c811251d592fe19bffac24e6d58a94b77e3023a0934c22cad SHA1: fa8cd647f6472a2e62cd613c4d370f6806989ff2 MD5sum: 97cafe8a661ea8081b694062d7d314da Description: debug symbols for tor Build-Ids: 03dd156d0159b659bd42fadbb2bded9b5243dbbd 5663d0d4d53f6b8746c7bb957fa640a094c02715 e2ce142aa66b9c31aab97e4d1cbda9f45e3320b6 ee6722fad35da7564e921cc658db491b1f5fd9f6 Package: tor-geoipdb Source: tor Version: 0.4.9.8-dev-20260517T181349Z-1~d14.forky+1 Architecture: all Maintainer: Peter Palfrader Installed-Size: 26437 Depends: tor (>= 0.4.9.8-dev-20260517T181349Z-1~d14.forky+1) Breaks: tor (<< 0.2.4.8) Replaces: tor (<< 0.2.4.8) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor-geoipdb_0.4.9.8-dev-20260517T181349Z-1~d14.forky+1_all.deb Size: 2742064 SHA256: be03a799d9f7da1fe30f4a03268d3c08fc331ec4a060f1972a2838ee0282161d SHA1: 6d3458d366d76563cf6ad3ca24bc3fea0a26b6fc MD5sum: 83bdef2c08426efb41b8d6c3b62d5e0c Description: GeoIP database for Tor This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries. . Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges. . Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.